关联漏洞
描述
CISCO CVE POC SCRIPT
介绍
# CVE-2023-20198 - PoC SCRIPT /!\
> **Disclaimer:** This script is provided 'as is' and exclusively for educational purposes. Users are strongly advised to exercise caution and utilize it within the boundaries of legal and ethical considerations.
## Description
Execute various actions on a target web server, such as creating and/or deleting a local user account, restarting the web server, installing and checking for the presence of the implant, and concluding by cleaning up the created user account.
## Requirements
- Python 3.x
- Requests library (`pip install requests`)
## Usage
```bash
python CVE_CISCO_20198_V2.py
```
## About
[](https://www.python.org/)
[](https://www.python.org/downloads/release/python-360/)
[](https://www.gnu.org/licenses/gpl-3.0)
[](mailto:info@sohaib.eu)
文件快照
[4.0K] /data/pocs/ef0a0223b6747877a21cf9e65288a6d9da56146d
├── [2.5K] CVE_CISCO_20198_V2.py
├── [ 34K] LICENSE
└── [1.1K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。